Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
e2036206fd22a1bbe3c26b37766f1d15_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e2036206fd22a1bbe3c26b37766f1d15_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e2036206fd22a1bbe3c26b37766f1d15_JaffaCakes118.html
-
Size
1KB
-
MD5
e2036206fd22a1bbe3c26b37766f1d15
-
SHA1
a3bb2835dfaeec9d074786d2c3bdd69c843ba354
-
SHA256
33ea9cdd09098d7c927a5727c49e5501369bc177a179e9b87b72acd73cfb02f5
-
SHA512
797cc7b702953f961ba6054ebd1eaafd8b8d3147cdff3c5d7a6324231f78ce7c5d9a9ba3ad81d1269d98dc0de1235aa32364d7ea477f25a95f8513a0d01aa8d5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0437E431-7337-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000040ad37d6d93115e10371396c2ff979cad72316ac02e504b3d7fc36c042cf3f8d000000000e80000000020000200000003c52adbbfcb546d2b22d94d5b6e76ca1509bef1d8a482c2e11f815bf098a8fa4900000009ff93875e80bafc46e509f19613f10f24fa6d9810de173ebe92e1dc05a98ed8af6a249c0e8d15dfd74b69e8b1884650bb3480cf1453d8d2bb401545d23b904393eb07450be64e3bbfc1644272f9f9fb58e992ad05e03494c5fb653170b4a08f607c0869d09164876a7d112daebffa9cc6b098fbb5337cbb3a73570253a22adaedb9f985abf6af8df519af69f6b5fbf024000000094e566c5908df9835d15f1d797946b9be1cba09a28b786eef8435c84097f2358f72499db258746657171fbb22054e983842710c3024941f1d83fef2639fece24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432548427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009396442b829e80779e7735ca74ecc4d5e83de317357a28e2deacf84de6fada38000000000e8000000002000020000000de0184e216ee18812a6833246530097db131c9147ee38e24f8a6ee0a3f059973200000007922d611802a2e093a446e9ddecebcbb5ee3e11bf18f523fb3ba53e48e82568540000000b13d3f9f4dfee0bdf724e10060e8a60bb55d55eaa5d958cfcb4a1dc8fed7c3abf4420b02f704288faa9f1c4bd2f26d242343807cf917ee0844a3b8e0bd75b1bd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a3ece74307db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30 PID 1744 wrote to memory of 2576 1744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e2036206fd22a1bbe3c26b37766f1d15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b084c0cc2c56abfc08001948a2dfeec4
SHA149acee81c711e4ddc9405c6782e0d17cb1c851bd
SHA256b5e5411186d814628b3d80171872b25660bdb3e2e51d3774d39da9fb2853ba85
SHA512027b797207101b0ead0755a28f2f03c62593ff9d525f6dd54ab2e701f820687fa871fb7e7dee0e2935498465898d3f644ceb744e482248bf1521b99c5ff41a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b148530685d70de1a04c2a9d4e0d71a8
SHA191d7d3adc2b7f7ec2ece9933e162fca3624b9762
SHA256977690e04250d57843622d1581b170f159771cbd04d471ae604ffed3bddc43fa
SHA512585f09f52fddcab3922de19a37ca90826087a8ae9d35f017d3a3c42b6928c6987b891fd019a29b4500e9789db9c9ca7db20fd925ae6d0f46bf8672200f2a81fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d6048c143d71b9ac6ba3063614f567
SHA12b6e61e78314d821b7356d6c4cf3141ad60e5c0d
SHA256ad7ac1152b06f54faf8e2c2141dd9220d10a56d6c7ba010775ac999f6b9800a2
SHA51223a666300e902efe8a2cdd0180acac3d148ebf96e808813bda08b4cde9fca57cd218bad3921e2ca9dbc6ad4d88bd6f7f5f879d8a18476ca31895cc77f61efcc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b26c19a00eb5148871abbb70b91d5aa
SHA13026b929da786f600c6f607f90b78ffb0a6e32ed
SHA256aac3a141074907f6b8c2c8b1d2020bc1a64aa41fda7daa6d25582b2be0fc2be6
SHA5125ac557db3885169abed6491bfc945cb2ad886e17a4d7b47451e2149a1c519090824a7058c0812ecba69df284bb6bc55a2006f67aadf3b4bddbe7c17aef087c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffe5ae81572a023a2206bac03c541545
SHA10b3d74366569ee8db9fd6c710b2ce42dec8f3bea
SHA2565f969140a6a43efb63d3472309b93158355025034cd73f4ea8e4b6f55e2a2498
SHA512da9bb9f96abb1a0edc3345deb165ab741d01469b31ce292915111a05be5944ee546fcc41853f8253bd2849571ff1d1c83c7d8ed736248d591e92a451c81b3332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e69420b4ad2d67754084101ab6370f
SHA10c495a4df51fd427419c1d8d7b44480c64de1540
SHA256b351c0b1aa6fa1ddeea85706f97b134de15b54069836cd6dd10743fae9bcdec4
SHA5129b7a9ade17d8f006c87aea920dca94927f95bf4d6dde26f38bfe7d3063f12fbd3c795af2129c6125e2d2dac9cfc151c8e303917d91a7c58c88249c984d4f30bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae559c0ffad7c958854bfc7f97c9b00
SHA13d6ce171cbcc931311027811648c375b0031c664
SHA2568c2220ef2ed0e6133b3c6523f71cc77c9b6eaa0e802b609eeac88d639e330e57
SHA512b32bed3477001f79ac19ca3209133fcb216e361bb0abad9375e14426b94d2acb50109347675af442e9e4af727c79cab44a06c7c199713c8efafa8e35b14cad0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbb02da7a1a167e06fe871a343e03ab
SHA127821e12fef19f8b200a71eb70b6f5c6881612cf
SHA256abfc53c7b71a5b45516f5993eabac495b7e88235d28d7424a5c80fe01719e663
SHA5120b0172fce9efa7dea28d2e8a535c066812c55bed27790d109507cdf61f667f3853442fce7dff5574661b32ff306fd0d8032ae64bc8ef27461bedb88520f6ea7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49c88f4c858bf7ded909db80ec87ba6
SHA107bf9d23b910aa0a1e68de367cf45aaed9b8779b
SHA256f8ea7e43fa5842f29b11a29eff019c2cebc8ebba196e5ec8969e169ddfb76690
SHA512d867c4febfe438a2fe111c4b18f3d850b791df53d93d1a9e7eed53bb80d5d06169de9db589c685dccb0d41ed528400076a78321f2e9139f4b012b20bae82e5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b93da73214820791dcb28a9b5d2b922
SHA15695f9cf8f824c6958bfb2c5380830635b167541
SHA2565ca3ebdfa97be5095f16215edbe34c538e2fe48716129c3a47e3ec4374567bf0
SHA512bd7d488f9aecefddde1613e427f0d0d9a35e07142603f731ea37d040ff31051414a75c3e323b88a6d0c50e61d1951064799766b04da4a28dbb25110434708cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534af0f70d2ea5f4c3ac9000f597424bd
SHA1145071afe68309a056668724f56850b7d281f5bd
SHA25616058309ecf68f3fe7a35ce2e989ebe006e3207f4c34bcbb8208679e4e07ee8e
SHA5126444302d7a05aa57f29e553e41a02f1e2c5c7a201668579fe9d16a61bb08a6f92eca1055ef847a5d4f26b7d782d0e35b4483f5e68138bdfa051d32e5dd47dd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6422e9c4a190e0f543d0e1980528a1
SHA1468c464cb475db9cbb7357fe1fdb980eddcdcfc6
SHA256025ee09af4096eb126d18ea2388a3cd249fe05ffc9cd85ae7c406233de91f9fd
SHA5123fed3b5c530ddf6336916b1f2fa9c35ebbb6bab501859b0940c0ebaae3aa68f6af24148751f9e20dfba2103add38d58dedc803dca32d8acbb6180d5c880b0dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6bf62ea6eb6a262acf1d9c23b2483f
SHA1f39565dce595ec01ba56b0696f271b5a166330a8
SHA256c3e7853ffeb897eb43588ba6b01d22b8e032ef29f4673128de5a9770bddb3fbb
SHA5120948fc143a400e4605cca7afa4666bb99e74656fea30e9942f5dab58514f1cecabdfe4ef5e19a551d0b06e20cfb445331f4f7e8502204e0243f850b62615c132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d88648cbb9d567167cdbb519e626c8
SHA15f69fcf964d70a61dc4107a05eb0c514c92daa1c
SHA2562cc98acd2a55065b62ff6685a3adf91d4f1c6ca9084c1bb3b53fc63d96c15ad9
SHA512681e93b05dea0daca8dbe1bae3219fcd4d92e4eef030dc47402f6c7f55a960fb0f97464375601371d98be2503fc4d258bfb33411d87313448bb021de2e68edf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a226feea1e1580d5225e70772c3fa8
SHA1e3c728cf25072c19c572ec28e95b54afea22ffcc
SHA256380a6a8c8faef32816947236df7838f33e6dacc3a033c595e5b7e4989de27f96
SHA51217f0e1ab61f04389f6b3fed102c32f282d6a5394f3b2bcd423e14b164ddc62c0d0aada07276fc4b9f2325cb5a96fa8c69294f83857cbfb579df48f6b860c95d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871cfec53996234123fa7121776a10ea
SHA184e82434594d1cde08c37b45f907214f51205952
SHA256651cd8eb28f8f6c61cf1cfeb167c0eec1b188911fa48d93341d77f03cbdf66da
SHA5125506769b4d9c80379144198ce3ad6a05135f8ea22d348be5192201df820911eba5ab3124793fb6fb204ac5de1e351822d6c6d2aa9721a736b6de0a272e870785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c39df1cc909780dd1522edcfd58cebb
SHA1b42b7279c8616b006a999369fd2d354db9460c22
SHA256dbeb747a8488f097d8a946a8b7dbe9e36082ae356ea4dad13c8397e09b741c32
SHA51218876e644a9a1eacd6cd4bf704a901ea10e2d864156c5c0f5f8cbf0a905a7d7eb7fd9f37a5a72ba0459e9ce2958a8a3b953fdb0e44957e1d3fc9a76c6e06a866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec10d9cab0927fd04034657b18ff887
SHA15ed8349f9e6c4884dcb71372f56ffc27d08fd40e
SHA2566f2730fe339b4c70516459095e24fc5caa6133072506a9e02645c3f1bd2b3914
SHA51200767407a3fdd514577026a09da84db35bde771c2c8e2369708b23419fe68578933c7363bd2a65ea7cbe5fe40da6b2aed062af200bf1c7bf0196ad112f172f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beb994cbe6fbe74f41d2be760fb01894
SHA1d1e10f26ef40b77e4674c7c61dfddbecbf57e4f3
SHA256a0c2e586bece8839f0fc5f9e4117815c5bd0860cec4284af78abe330b486a27c
SHA5127a041a73c9542152971942b92f8e610b5ed25f3c67df50f48cfc004ef61cec742ec65946beac623c0ad6ac597f7d3094ecf844c19a9ca2a607796c37048c52f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b