Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
d38b6b0906c9ca702efd59d22719927c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d38b6b0906c9ca702efd59d22719927c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d38b6b0906c9ca702efd59d22719927c_JaffaCakes118.html
-
Size
2KB
-
MD5
d38b6b0906c9ca702efd59d22719927c
-
SHA1
636a4e4ea2d9c99ca89e6290e1286807bdc8f366
-
SHA256
66a2bffa599ea89f296f8ff94f57e8c7beeda729d4a04de1b2bdbbd7bf714ea8
-
SHA512
4d6f07a4328f47e59203c0492d0634274cdca56395e3438db54b6a42cd6bcab166ee61897653639ec6a6905ee3aaa6098fe3fac52918cd25e7654868c9474420
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d99b6e255dfb6d29ab5fefef9492a25fc47d25cdc0879b920e1b5c20704f0a56000000000e8000000002000020000000dadc4de5f0a695cfcabe26e90537ff0d0b2b495471e244ef8f12d88cb6bfc0e8900000004aa0a01d8d5db17e580920670010107f06d163292c7bae0597c84790719a8e7e20b77f0f1ab5004fda87487fd26add05047c4bafddace76619f87bf80982cd485b1b7b24eb3023358b2abf46811ccd757182636502e742e3441e2b0f1f41baac18e65ccacb11ee2ffd1bd8dd52351c5658e714ec7dafcd5b48fcdfc997734b2525281d8d3707fe90d0490a10bac4bb43400000008ad7ce0331662610aa3564e76e7f9973facc07c0f261d9376f6831c4ac66603ba862eeda157cdad989e95af44c3986b455d436539c4a83eebab916e198a9e542 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31AF5F71-6D9B-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000491ebce76f00840cb9b1ce409ec6a4c70e4747a948899bab4bed73b8fb71b313000000000e800000000200002000000076a23c13c3d0d496eae9f0295b0394029bd96eaaded1d5f79bb4008c19355a5720000000b33f446b43046c1b93704bacaa164bb440b92ec32a2011df12e1b1e17763d32d40000000192be3b02a6cad24714736b96f69ebc2505a9b6a2c143a3c92e22bc66eee51c6e69cb58f999bfbed33bc3711f8fde1e77b9e9f36d0dcf96d343a99233f9ad69f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0873206a801db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431931746" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30 PID 2172 wrote to memory of 3020 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d38b6b0906c9ca702efd59d22719927c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d107e173cb0b1b6d3effadba4a53ef1b
SHA19f3e41db192e8134a59ae43bd86deb5a912a04be
SHA256e9f50d91c74ea6257f0c3bcdb5e84aca1053942a36846be90f6d41d87e49e9ed
SHA51214d73f7d508e0899708a642379ef152de0ff279c7ebcbb9695df5076b873107f9617b4f0d1d62e356fda35a7d1fddf40739f404df998b8176844ca58bb071c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598611f5f90d2821bce469a6b51d331f2
SHA15c5a4be42862b0c2df33f1172c2417f8501ae59b
SHA256d257882c4879bb4a9a3f16ba5d4448092a451423f9f86773324d183d63862b51
SHA51237d44f3153405cb9b653154dd14b33721a3d114359ce9d960992364ca111728c0d41532d428fce269e8aeb95780d28c5ef966c954d2684e50b236f60716f425f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5688bd1adc336df5056cbba41d913d2
SHA1598c03a9a4f83f40476157d2b988e32d6b583067
SHA2562282cc7c87e93ee9b8e203524aba5b61f49a07d89cc991547101e95610878e35
SHA512fe20876e9f1f7d32bb9e9205ec21dfc37864dd9ec85383e36516c056ac5887051240fb7149cf52825d085249a9d2c0754eed269d2b5ec5c168c6900e3eb17c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5d78dc23ef60ce02d44180c21cc4c8a
SHA1a13e10adb791aa9947a8f6f2148d319857aa6008
SHA25669068813439d8b314b72a28455f74eb7691aa2150c7d6c36092f291aa4e713aa
SHA512f581cc58219ca7e022c63dd688b73c48a81307e97bd9a6ca4a5c8b1ca7acbf3bcb6a52cd5d7c3f31c4fdfab1d3bd78f4e90a46b419735ba3af03f89554bedd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c5ed76ad4b8b5976c00815b67760db
SHA11d0b942af1f6e76c343b3bdd2290b10612bdda0d
SHA256412896d8d5aec1b2199e76b6a0e29ee542d394accb66d043d25593bfe9b31b56
SHA51262c7f7b42543e2d66d7c8fd0de319cfd5b90addf317dd64816eecccfe04e43bf05a94845e44f6958e251801a3b1c46952c4162be70dd7046cb3263d5862e67c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8c6d1075a21590acce2d629c3b1c76
SHA165313de924e373b4cf963613f256dfbd57e4971c
SHA256c37b27bce237270c08b1150b9d77cf08bca661ca9d0e71f6fa005095d56cc4d6
SHA5127a64e9b94c62fb0dc5c75668e3bb485916fc4a89c1cf16b7653682ee10cc49900df07a30be27babe35266415406039949bac6d2a1d9c747f87c7720246900d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5337a911f442fa9fc4078732c1dfe13b9
SHA1fe3af2855b5cd6779aec91fe702f305032b832fa
SHA256a728bec339f441fd93aea51ba47778767425a62b588171a15aa8709e707da3de
SHA512641c3eccef5824ef5d9a2eaee2272f5747f67631bc167c04e9206313b62200a248f4d649e1a1b0fd1ef45d9b71efe08746c4e0d8442d5b67a656d3fc2f75e8b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db98dd6dfa824080a953ef7ac2d72ef6
SHA1d826ec743902da7fc4c23aa805f99743ff6b1bcf
SHA256fbfe3b7e09346dd3c9c718d66144638fa50b7a4d44efe493c526e3d634b6363c
SHA51250af479cdd4881c7407093dcf403589c304a2c204a63265d11ca6816e79e333ce6b1f7ce2f09d09733f77ad8caeca62e3df9f62fac7eee04b798791f5a2f5791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e6ae540a570d2e86e8973158f4de4d5
SHA1c6eed707670279212d25b045434bbe10788f843e
SHA25689ddd04f62e7f31abbfc5d97a22c2718a0d141a71c0a93aed6ce1c54f48c0208
SHA512b4b969eea381181c405c4058d11ff3c21c03afca8ae1d815eaf818603093df5c7199068af1fe259ac24242a70f97f76f52d0fa3b31dc3f0ece442bc7a053efb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8838228044f4dfc616bc3f4efe73b8
SHA14eeda859ba2e14e2f53c108120cce9b05735ddec
SHA2562ab8423a3f537a860813aa4dad3f24acc510c316e01e745bb079740121e92fbf
SHA5125d243b9f1c5c687f402c176c93875b62e8e63d01d3bd91db78c706a57a47fe6d8d490dbf30ed2b7920a7edd4db5fd016ef5fd0c723b4a12ad96b5b3ae7202d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12ff80716425d44ce8e746016650500
SHA16be4665346ee85cb9ec44c743e79de66ccc1df08
SHA25644422db16b9794c36a482d981049c1b15bf69889fec05954f22fd6c0d8a9d99b
SHA5125b0c4eeb5c4affc4d63f4a84c29242d181f1b28fa5cb0388f05b345a762109f424de6021bd169884e7dbf8c8dea23541ba57c8552f1e0004a5ac4f679d6835fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3529df970db304fa01de909124168e
SHA1dc30d3b31a922960b2c4581807ff90f6fb7ace0d
SHA256b0d899b36d4761c3e9f69bff8338c355c259fe09d991eead97ae64c02705fec1
SHA51224f3937d7a8890c369f78176e2f727c8ab95be3613e568371b37dd10701ac1cff37bfc14d0f958d5fc9c0930be9141929e083437319ec2e292d5ce889e76225a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aebdbeacd90532320ed4858e2bd4d12
SHA1703d468b92484a949da0f5646c2b8e541be2256d
SHA256a872dfdfe9d45a3137807d8b0c5013ed673cb08c63af9cd28b3c4aaaa4566ea2
SHA512ed9dac120ec1dc99ce30fe9d6975377af99588d07a338fad98cc1a65bb091fb04bb9ef57c9c543e88db4ee3aaf4bf02d1bb2a8718792e22530aec1f068631038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46046617ee33bc14336f11ad5135bd6
SHA1c8c648ec5d022ecaf870317e7fdc9ed2e634c9a7
SHA256f032dcbfd4f2c255757d9715ec8ec2d91c45feddccee711a3b234eaaa2868eed
SHA5123b2af63339e4842e383c4a9e0d300aadb407ad338e193f7eb7c8238ee25dbc3cc8b3c4908fa05807920bff0dee083c6b8f8167547e274c7e523008d8cf7f9161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576461aeadb20ccf0661f3bac3965cda2
SHA1115a8e09c5bd232462315721454be787c82b0528
SHA256e89bf81c497e51228596ab83435a09d892edeeb40febe076236234c504606be4
SHA51253793130a326d7376314e66b03c0c9924c346219d73d273e641d4550d3bb479adf8f6ae4193bc6a578edfec301bf75d7ed20d55bba530fda99d9da1fec4970b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9784101489a921056cd86a519426fd9
SHA1b8391ed91fb24b446d80799d79de468eb2fa2b90
SHA256efde7245f398f0a73950214a103c73ce2e269c5f900f71dc6636fd7244271a40
SHA5125cf6a675b0fc045bcdcdbaa022071d8b07f91b3086747d6bb7c84d7db2c670960cf19ba49993d3f6087c9425795ea43344ee5af85e1aa94110b64b373d791475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13a1f74ce0bfcb19813fb3d0a8b66b7
SHA1ddf1c2e8348775f4499d1f6f44c1c62d92993cc0
SHA25673b519e7b676d32be4ff93747b19e443208004bc1d5d3fb0a7f0af8a75f749a3
SHA5128ac8a725b383bcf6f420e6acc8ee1ce6be37b3db3037cd94e75df6efd6e5ab560f86a7c207d24beca90b140476c2b8e67a62957d0a9f7f73bd27e1b20ba18326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500993dcd12d303f9758f29a57beca1a9
SHA1edba56a741f9721a333b376c59ef38ad28101f87
SHA256cd44c3e86cc51f10ece9d1b7169ca1290c328116bf2a42f9c4990fa1e8b64be6
SHA512ac1fdb7dfc44d83a74a531276020304fdc34c6167623c1067faaa7a9b594b57ef95b32e1ad65f8c48b0b362c72b9c94e8e88387cf9afb7961cef803782b9d9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a752dfc9d2d52de2a4f5534546b56fe
SHA1149419ecb2f47c88b15b626320fd1fdd485c208d
SHA256c1f3252d054c7e4dce9e089f0264edec580cf380d5462e4b2022dbf6be5b7daa
SHA5120aa96f00a7601344ab3bd93a005b588f9bb677e3894a49077e7b51c6f0186e1ee6fe0d8405cb05bf48f4633e080c421e0cfcc9b1bfc84ea8a3cb2ac0a32c2771
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b