Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe
-
Size
184KB
-
MD5
dbdd027cdfc5b84925a66d485950a487
-
SHA1
d067f3bd08b5aaf4858d1509047cc8b9589ef9c4
-
SHA256
d145db38fa0c2a58879c9df83d59129ef25507f8e5e5c268f9d417b1e1f7852b
-
SHA512
bc6833a495ac0fbd17799c866817de2e5f5e4fb6053f4adcf63718b8c660eb831e1d58a8346d880f2b577b701ab042594a3a8c1406ee042bcae40e7ab08910fe
-
SSDEEP
3072:t3/tEqC13oE4h6anfSZTT74INLts0mWvUxk3BfBK88SizsL:tG0h6vZASh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87D2F891-70C4-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4034ee76d104db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432279354" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000620c13412ba02e39b4807b25649fa334c92f880a47e235be27c311cabfe3846f000000000e800000000200002000000057924849f09ccc77c2b833c55afe05429bd22bcc1afc7f2d57fa2a6bc8c93a9820000000bc8bc5904ecf664cacab2c065218038b302afce16e38b021782cda364292c50e4000000018eaceb366c47c353059c36d8e720a10e076ffb1a8481715d0db5b2c235c1ce7bb81341d74c133c4e9abc57114cd0b482c8dadfd14417757288f6133141cb4f0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 2304 iexplore.exe 2304 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2304 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2304 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2304 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 31 PID 1900 wrote to memory of 2304 1900 dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe 31 PID 2304 wrote to memory of 2852 2304 iexplore.exe 32 PID 2304 wrote to memory of 2852 2304 iexplore.exe 32 PID 2304 wrote to memory of 2852 2304 iexplore.exe 32 PID 2304 wrote to memory of 2852 2304 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbdd027cdfc5b84925a66d485950a487_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://dedeyusuf.blogdetik.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b278155b92239b421785a3882605da
SHA1ce0bc98c6fd9430269d337bfaaf14d984511fc03
SHA256474bdaa6831c0a8c19fdd78d6b2b6389d66772241d71101447b5f98aee63934d
SHA512d5a43556b685a9866317710f8538a47582b2bd0449d0f115c8b61ebb86ad2506cc3287459f4b4c38156b964e0925c609fd295bc255289495e1b62e684f947f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a42cca92ae36e1168b343df1cfb30c
SHA1d97c58dafbe4fd066d7a68833ef07394a5ef91e0
SHA256e2c7d7f2f22f5a4c160931e96c7e695551e4188f23a6a325abf4ba0abd3801bf
SHA5124d0515c44c7916914c6560fb7cdcf3c79b110fd42885b3539e8189d37e93470fce69e260e6eb662f834b9c4fea32ad46698f7f6219d3bae43639ba6e646970b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a6cb959fbbda74475cd9ea8afdf1b3
SHA1920413fe1c52774c0cb12f7bb99f262e68297e16
SHA2566b15842d4b8596f7b678ed61b4cf23ba37b0164ae5413aa62f384f3d8f260d21
SHA5126db4396323a22def179a538c777d5ea203fbdfe712cacb1ca497a5108724b23d6b02cef0583eae0779cf8b7d174faa8e7cab63d3a0f52daa5d19d499cfd9e538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567df878fedf6657940418a88afb7ec52
SHA13884e43d217a6388b1605ba939448068311cb1c3
SHA2569d73ba277d89b98e3f29dab16aa6532e05b8f0aeb4bc2fa081985f44e7e924a1
SHA512d073850dba5c392ccf69c4cb4697998208343990f296d5d5bd5b01c132106395d6d22af10e76e216940e6b43413fbc311692b59dc58a172d17480a18a32fb5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b313b3b7691e6a2d54b050077e7cd9
SHA1f9698200d3154b036802eb5c2e40e9c07a06c098
SHA25696d1504286ae4cb700b237d50009a6d69e9775fa674ade3e3362d7cd2a8ab253
SHA51272e74efba55fd5b67799dd3d012e0d2c839ba202f76586d854c21a6cae2bd9abd463d972f2e60a02aa37959baa7267a16ae47f5ef3259618ea9fe4c861672a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb26b4951cd23a161940ced894b2d7f
SHA13ab6fac7e0d0ddf3ee5ac7b0467881af090a7c33
SHA25677ffffabd115ca053939e024d3e38465d5051db02a131fb2dbda79eb7527c544
SHA512d92676e9cdd5f93a35a31a7720e479cb13dac36627890614c497a4c95c374918e42b7de7e2529dd97fb1956c6e7ffaa10d23236cd1999890ae4654e35c13b57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab47868c4d777c22572c947c358744d
SHA14514146ed83c2f39041850728928004fa3a49339
SHA256978a0d2476811584f5c971313a1e0356ed165664b91c715161b4dc104000f494
SHA5125057315038c8a265fa3483102877892505348b838d966b32e12437900bb3832de73392de4f58a39e769ee49fc09884322c45be4b6533cfdad3c2a041af1b41b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5813774e6a0f648d9d04da5f7fc1a0636
SHA1364d3dfb17dc22240077cc30d28025ada414945c
SHA2561666b595c8e7faf401113f06aafe59ef5f4cc991bc1b4a6dacd2fd9ec15872ae
SHA5124f060a6f8a64719b5bc73856d8ca44e6ffb335f25b4d66989bb533ef04538802e6cedb58cc28fb92d5b1d8dd88ba28540e6a52d026652c1db69623d03f964ba3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fb3fd214137851e9e293599ef246ce
SHA122797de5a9be8bc1730e8863d4615d023fc00e47
SHA2568cdbe0100baf78b5cf30d2fe85b2908d118ef34e8e7efa69c29d6e308c73fb82
SHA5121d285683d2f46264d7c8cf7a5c07ff65535f5730e32704bd255032ce9918b0c56d56cd39b35652d2507b6ca339160a4b4debb8567adbfd9008d029cb8a346804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f458e7339548e9018a733a88e44802f3
SHA184e757213a00bb906c4dda689a402ba3433cb416
SHA2564a893bf7938abac9c28db55847fe0ed7956b441231afac81264a92e85e1b768d
SHA5126b8e6f45248d0c79a1daf3844cd3fd8aabcb805734821543c756000f93aeed438724822a2311bf767b3162ceb6f64e15ccadf6e0a3944390fc03806e9929575d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529498b4958549f0dddc6f80603c74a16
SHA17fcb8d843a7a6a4c36f822d157696fabfe18c835
SHA256ab86b08eec444396eab8ff5e4883b0992548d0f4caa96154c8600126fdb423c9
SHA5120a9ebe32658fee1d725a57b07238ab2a908cf09f084085683a45eaf2b3684c09f1a3fdeeb5c93c62e8acc685f63aa2d612628a3ed7cc6261d86397f3a7a9d2e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52754eb8df9f3cd0feeabc01381c8c6bc
SHA1726881b647340a6eb3336d90ed77a357e3f79b9c
SHA2565bc42218ecc07c29a4f692e5b07e6a9703d615ea9db68b72b05ad7505a30a48c
SHA512418da194bec7272d81f6f53a9958ef97aadffefd98c0ac3a4d726808a47335b574b077df0562b67bed38a2c126a2edcb9f635f303817ba5bc6b82cbd162fe2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6729e2ed61f54ef6fecac9cd4e81044
SHA1d9df001d4ea5afab038ebd8ca5bb4628ec9213dc
SHA256634c387f8420d86a0d6f53703c0d4563d63bcf37b256250dd46e6fc6ddd3ce65
SHA512eea94d68fa7efdee402d803c1928016e04e084698529c27891cdad907a7a92d95595e7fee0a881208dd923880fc64a0f36c73e9dca076bfcbbcd2fd5eeadb9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab64c2e4d5a516ff0520d3c4b4d21358
SHA1eb0d0c79b4516634b1df1336078ac634e66b00ca
SHA256368f43d630a5ffb0194589237ea7058cf83f0c424bc5fce751bb00ce176c9691
SHA512e87b0786cb91edf0873074fc55a5f26a9919c6341674027cdcb569b64b735127b92296abd82e18f48c9820ff441cb7a376437423ccfea54dbe2cb6742c2ef024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf3e4cbb461904fbc3a7095c6f10555
SHA1200fe3cab81065b15daa4b3ab20fecd63c5f2aab
SHA256b56b9ba823948826c5cab56c98b2313700455bf7819745c9332b9402427bd780
SHA512213cba97eb6f8aca658ee5bf1c83edbe430d4652efa6c03d6f1d673a6f861528e721eedc30b740b9452a34c7ab668e3f094ac5c64c256d3fdc69d6592497f189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7ffaa18ee8b1716189b1eff36bf2bb
SHA1df9c4ab35c378699b15bfb5c18aa603cf50187e6
SHA256e3583538e444a836465432eeb94fda52ee16e9250df58875da6703499ff2a2a3
SHA512d0e4a4ee489bbe87fffff844c6e5c7725190f957ab2f8db23919cfb09cfc23bb8c2f4654c1a14ccf320206a68005044953fc67e4c3b6c0076b6a30ff5edcd9fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7207033299aac6ddeeeec4bd2e536f3
SHA1df6863bb4f3703a8a4f29648d677208daedb6721
SHA2561123f31978b7d4a0f278d7d4a83d14628857957f09585e44eeb60b69229a52f4
SHA51267e58340cc5e01d6a4cf9ef6fd6cab4a2b2fc20b4d7a79fb8bbd278976e01fa9b7ffc1327327ac6d5652156053ab1632ac56fc5034d369de4e7be5e2a2f81ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59708ac30e2874bbff7191c51b2ba601a
SHA17e3bcb4075cd65ace963f9ae1314b854c9e3f2c2
SHA25614ced7ea80bee85c3e40b4bcae67252e852769b98af8b47a1b7cb379c50c8e77
SHA512a2106f3240f88aa40b8bfb7992bf94ebe68440ff51b4d78d854fe2e4a4bb62615afec8d6f0b1e3b201da908c227f044e1f23730a3f02b415c969c4d8342739f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bb3342b5083238ab821f0e150441e96
SHA1d19d93d97a8954b01a59ce66ca7d2c84da1b6b74
SHA2569d64fd511ba3956fc0d7370d083b21a3c4c320c64b723af76e94734cd823c87e
SHA5120bb9f548aaf62811c022a177b146f99788d052d1fb4a98aa3e67eefe30c7095ba348aec49fddb3cffa7f905b6e19ea3a89f1bf0212522eb8d0dd208afc6c36dd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b